Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
SonicWALL Global VPN Client Remote Format String Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
Global VPN Client
by:
Unknown
7.5
CVSS
HIGH
Remote Format String
Unknown
CWE
Product Name: Global VPN Client
Affected Version From: Versions prior to SonicWALL Global VPN Client 4.0.0.830
Affected Version To:
Patch Exists: YES
Related CWE: Unknown
CPE: a:sonicwall:global_vpn_client
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

SonicWALL Global VPN Client Remote Format String Vulnerability

The SonicWALL Global VPN Client is prone to a remote format-string vulnerability. This vulnerability occurs when user-supplied input is not properly sanitized before being passed as the format specifier to a formatted-printing function. Successful exploitation of this vulnerability allows remote attackers to execute arbitrary machine code in the context of the application. Failed attempts may cause denial-of-service conditions.

Mitigation:

Update to SonicWALL Global VPN Client version 4.0.0.830 or later.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/26689/info

SonicWALL Global VPN Client is prone to a remote format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.

Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the application. Failed attempts may cause denial-of-service conditions.

Versions prior to SonicWALL Global VPN Client 4.0.0.830 are affected. 

The following proof of concept was supplied:
<Connection name=> AAAAAAAAAA%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%
x.%x
<HostName> BBBBBBBBBB%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%
x.%x.%x.%x.%x.%x.%x